CVE-2023-54207

Source
https://cve.org/CVERecord?id=CVE-2023-54207
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54207.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-54207
Downstream
Related
Published
2025-12-30T12:11:06.643Z
Modified
2026-04-02T09:45:41.181561Z
Summary
HID: uclogic: Correct devm device reference for hidinput input_dev name
Details

In the Linux kernel, the following vulnerability has been resolved:

HID: uclogic: Correct devm device reference for hidinput input_dev name

Reference the HID device rather than the input device for the devm allocation of the inputdev name. Referencing the inputdev would lead to a use-after-free when the input_dev was unregistered and subsequently fires a uevent that depends on the name. At the point of firing the uevent, the name would be freed by devres management.

Use devmkasprintf to simplify the logic for allocating memory and formatting the inputdev name string.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/54xxx/CVE-2023-54207.json",
    "cna_assigner": "Linux"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
cce2dbdf258e6b27b2b100f511531edabb77f427
Fixed
f78bb490b16ecb506d4904be4b00bf9aad6588f9
Fixed
51f49e3927ad545cec0c0afb86856ccacd9f085d
Fixed
f283805d984343b2f216e2f4c6c7af265b9542ae
Fixed
4c2707dfee5847dc0b5ecfbe512c29c93832fdc4
Fixed
58f0d1c0e494a88f301bf455da7df4366f179bbb
Fixed
dd613a4e45f8d35f49a63a2064e5308fa5619e29

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-54207.json"